The major social networking sites have all been fined for improper use of private data; is that a trend that should be ringing alarm bells or a sideshow for the paranoid and uninitiated?
John Fontana's blog traverses the evolving digital identity landscape and its intersection with the cloud, compliance, audit, privacy, mobile computing, API integration and security.
John Fontana is a journalist focusing in identity, privacy and security issues. Currently, he is the Identity Evangelist for cloud identity security vendor Ping Identity, where he blogs about relevant issues related to digital identity.
Phishers are actively trolling the Internet trying to trick users into giving up their OpenID-based log-in credentials to popular social networking sites.
A pair of entrepreneurs thinks labels on websites that outline information sharing rules could go a long way toward protecting user privacy on the Internet and improving business relationships between consumers and online services.
The proposed Social Networking Online Protection Act is designed to shield the social networking passwords of job applicants and students.
It will be at least a few weeks before the Electronic Privacy Information Center (EPIC) finds out if the FCC wants to provide an unedited copy of its report in the Google's Street View investigation.
Nearly 800,000 deceased Americans each year have their identity stolen by thieves looking for financial or other gain, according to a new study.
The Electronic Privacy Information Center wants to see the full, unedited report the Federal Communications Commission published on its investigation of Google and possible violations of wiretap laws.
The National Strategy for Trusted Identities in Cyberspace is getting its house in order a year after its inception. The issue now is if it can gain speed and rally a critical mass of public and private organizations to join the effort.
Finalists are picked for the $10 million pilot program being run by the National Strategy for Trusted Identities in Cyberspace (NSTIC).
A trio of researchers is experimenting with vibrations, sounds and flashing lights as the basis for futuristic, secure passwords.